必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.216.52.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34198
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.216.52.96.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:44:52 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 96.52.216.125.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 96.52.216.125.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
210.245.2.226 attackbots
Sep 22 12:54:06 lcdev sshd\[28873\]: Invalid user user from 210.245.2.226
Sep 22 12:54:06 lcdev sshd\[28873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.2.226
Sep 22 12:54:08 lcdev sshd\[28873\]: Failed password for invalid user user from 210.245.2.226 port 48756 ssh2
Sep 22 12:58:54 lcdev sshd\[29329\]: Invalid user upload from 210.245.2.226
Sep 22 12:58:54 lcdev sshd\[29329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.2.226
2019-09-23 07:02:17
166.62.100.99 attackspambots
WordPress wp-login brute force :: 166.62.100.99 0.144 BYPASS [23/Sep/2019:07:02:36  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-23 07:16:20
118.163.178.146 attack
detected by Fail2Ban
2019-09-23 07:11:30
129.146.129.165 attackbotsspam
Sep 22 22:20:52 venus sshd\[21921\]: Invalid user 1q2w3e4r from 129.146.129.165 port 62117
Sep 22 22:20:52 venus sshd\[21921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.129.165
Sep 22 22:20:53 venus sshd\[21921\]: Failed password for invalid user 1q2w3e4r from 129.146.129.165 port 62117 ssh2
...
2019-09-23 06:40:15
189.254.230.214 attackbotsspam
Unauthorized connection attempt from IP address 189.254.230.214 on Port 445(SMB)
2019-09-23 07:11:06
192.99.12.24 attackbotsspam
Sep 22 23:26:04 [snip] sshd[1981]: Invalid user templates from 192.99.12.24 port 58650
Sep 22 23:26:04 [snip] sshd[1981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.12.24
Sep 22 23:26:06 [snip] sshd[1981]: Failed password for invalid user templates from 192.99.12.24 port 58650 ssh2[...]
2019-09-23 06:45:44
119.18.154.235 attackspambots
web-1 [ssh_2] SSH Attack
2019-09-23 07:08:30
185.143.221.103 attackbotsspam
slow and persistent scanner
2019-09-23 07:14:55
138.204.141.20 attackspam
Sep 22 12:49:21 php1 sshd\[1609\]: Invalid user oracle from 138.204.141.20
Sep 22 12:49:21 php1 sshd\[1609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.141.20
Sep 22 12:49:23 php1 sshd\[1609\]: Failed password for invalid user oracle from 138.204.141.20 port 59674 ssh2
Sep 22 12:54:04 php1 sshd\[2078\]: Invalid user jeremy from 138.204.141.20
Sep 22 12:54:04 php1 sshd\[2078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.141.20
2019-09-23 07:01:12
91.132.103.64 attackspambots
Sep 23 00:06:45 rpi sshd[926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.132.103.64 
Sep 23 00:06:47 rpi sshd[926]: Failed password for invalid user tomcat4 from 91.132.103.64 port 39872 ssh2
2019-09-23 07:13:44
27.111.83.239 attackspambots
$f2bV_matches
2019-09-23 07:12:47
163.172.251.80 attack
Sep 22 18:45:59 plusreed sshd[15847]: Invalid user tuan from 163.172.251.80
...
2019-09-23 06:47:19
219.223.234.1 attackbots
Sep 22 20:23:15 xb0 sshd[28726]: Failed password for invalid user carrerasoft from 219.223.234.1 port 53181 ssh2
Sep 22 20:23:16 xb0 sshd[28726]: Received disconnect from 219.223.234.1: 11: Bye Bye [preauth]
Sep 22 20:33:12 xb0 sshd[28665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.223.234.1  user=r.r
Sep 22 20:33:14 xb0 sshd[28665]: Failed password for r.r from 219.223.234.1 port 22123 ssh2
Sep 22 20:33:15 xb0 sshd[28665]: Received disconnect from 219.223.234.1: 11: Bye Bye [preauth]
Sep 22 20:36:48 xb0 sshd[24531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.223.234.1  user=r.r
Sep 22 20:36:51 xb0 sshd[24531]: Failed password for r.r from 219.223.234.1 port 35975 ssh2
Sep 22 20:36:51 xb0 sshd[24531]: Received disconnect from 219.223.234.1: 11: Bye Bye [preauth]
Sep 22 20:40:16 xb0 sshd[12860]: Failed password for invalid user IBM from 219.223.234.1 port 49814 ssh2
Sep 22 ........
-------------------------------
2019-09-23 07:01:30
115.226.248.33 attack
Sep 22 13:22:06 eola postfix/smtpd[27252]: connect from unknown[115.226.248.33]
Sep 22 13:22:06 eola postfix/smtpd[27252]: lost connection after CONNECT from unknown[115.226.248.33]
Sep 22 13:22:06 eola postfix/smtpd[27252]: disconnect from unknown[115.226.248.33] commands=0/0
Sep 22 13:22:07 eola postfix/smtpd[27252]: connect from unknown[115.226.248.33]
Sep 22 13:22:11 eola postfix/smtpd[27252]: lost connection after AUTH from unknown[115.226.248.33]
Sep 22 13:22:11 eola postfix/smtpd[27252]: disconnect from unknown[115.226.248.33] ehlo=1 auth=0/1 commands=1/2
Sep 22 13:22:15 eola postfix/smtpd[27252]: connect from unknown[115.226.248.33]
Sep 22 13:22:21 eola postfix/smtpd[27252]: lost connection after AUTH from unknown[115.226.248.33]
Sep 22 13:22:21 eola postfix/smtpd[27252]: disconnect from unknown[115.226.248.33] ehlo=1 auth=0/1 commands=1/2
Sep 22 13:22:21 eola postfix/smtpd[27252]: connect from unknown[115.226.248.33]
Sep 22 13:22:26 eola postfix/smtpd[27252]: l........
-------------------------------
2019-09-23 06:54:42
206.189.232.45 attackspambots
2019-09-22T23:58:04.070858tmaserv sshd\[21982\]: Invalid user admin2 from 206.189.232.45 port 35820
2019-09-22T23:58:04.075439tmaserv sshd\[21982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.artifice.ec
2019-09-22T23:58:05.624505tmaserv sshd\[21982\]: Failed password for invalid user admin2 from 206.189.232.45 port 35820 ssh2
2019-09-23T00:01:55.925910tmaserv sshd\[24912\]: Invalid user bretto from 206.189.232.45 port 48528
2019-09-23T00:01:55.929853tmaserv sshd\[24912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.artifice.ec
2019-09-23T00:01:57.567847tmaserv sshd\[24912\]: Failed password for invalid user bretto from 206.189.232.45 port 48528 ssh2
...
2019-09-23 07:07:44

最近上报的IP列表

138.169.123.123 159.22.123.95 114.37.203.32 53.188.204.196
140.116.223.125 68.51.70.33 98.16.65.79 224.21.68.142
50.123.218.95 153.12.98.150 215.211.143.222 170.51.73.225
109.115.184.60 35.39.51.10 155.107.18.20 49.129.44.187
246.36.165.109 84.89.27.90 61.178.152.241 230.76.35.27